New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCIA Exam - Topic 2 Question 75 Discussion

Actual exam question for GIAC's GCIA exam
Question #: 75
Topic #: 2
[All GCIA Questions]

Which of the following techniques is used to identify attacks originating from a botnet?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Malinda
16 hours ago
Definitely A, right?
upvoted 0 times
...
Sharen
6 days ago
I thought passive OS fingerprinting was more effective?
upvoted 0 times
...
Quiana
11 days ago
BPF-based filter is the way to go!
upvoted 0 times
...
Alease
16 days ago
Passive OS fingerprinting, huh? Sounds like a job for the cyber-Sherlock Holmes!
upvoted 0 times
...
Almeta
21 days ago
A) IFilter? Really? That's like using a water gun to stop a tsunami.
upvoted 0 times
...
Dottie
27 days ago
B) BPF-based filter is the clear choice here. Filters out the bad stuff like a boss.
upvoted 0 times
...
Blondell
1 month ago
C) Passive OS fingerprinting is the way to go. Gotta catch those botnet baddies in the act!
upvoted 0 times
...
Callie
1 month ago
I'm a bit confused about recipient filtering; I don't think it applies to botnets, but I can't remember the details on the other options.
upvoted 0 times
...
Jesusa
1 month ago
I practiced a similar question where we had to identify network attack techniques, and I think BPF-based filters were the correct choice there too.
upvoted 0 times
...
Stephaine
2 months ago
I feel like passive OS fingerprinting was mentioned in our last class, but I can't recall how it relates to botnets specifically.
upvoted 0 times
...
Mohammad
2 months ago
I think I remember something about BPF-based filters being used for network traffic analysis, but I'm not entirely sure if that's the right answer here.
upvoted 0 times
...
Alpha
2 months ago
Recipient filtering? That doesn't sound right to me. I'm leaning towards one of the other options, but I'll have to double-check my notes.
upvoted 0 times
...
Chandra
2 months ago
Yeah, BPF can analyze traffic effectively.
upvoted 0 times
...
Yaeko
2 months ago
I think B) BPF-based filter is the best choice.
upvoted 0 times
...
Krissy
2 months ago
I'm a little lost on this one. I know we covered botnet detection, but I can't quite recall the specific technique. Guess I'll have to think it through.
upvoted 0 times
...
Marion
3 months ago
Okay, let me think this through step-by-step. Botnets are networks of infected devices, so we'd want a technique that can identify that kind of activity. I'm going to go with BPF-based filter.
upvoted 0 times
...
Pamela
3 months ago
D) Recipient filtering? More like recipient confusion if you ask me.
upvoted 0 times
...
Johana
3 months ago
Ooh, I remember learning about BPF-based filters in class. I'm pretty confident that's the right answer here.
upvoted 0 times
...
Loreta
3 months ago
Hmm, this one's tricky. I think passive OS fingerprinting might be the way to go, but I'm not totally sure.
upvoted 0 times
...

Save Cancel